Table of Contents
NSA-2401 User’s Guide
15
9.5 Backup Software Screen
...................................................................................................
220
Chapter
10
Application Screens
.............................................................................................................
223
10.1 Overview
..........................................................................................................................
223
10.1.1 What You Can Do In The Application Screens
.......................................................
223
10.1.2 What You Need to Know About The Application Screens
......................................
223
10.2 FTP
..................................................................................................................................
224
10.3 Print Server
......................................................................................................................
226
10.3.1 Print Server Rename
..............................................................................................
226
10.4 Copy Button
.....................................................................................................................
227
10.4.1 Changing the Copy Button Share
..........................................................................
227
Chapter
11
Maintenance Screens
..........................................................................................................
229
11.1 Overview
..........................................................................................................................
229
11.1.1 What You Can Do In The Maintenance Screens
....................................................
229
11.1.2 What You Need to Know About The Maintenance Screens
...................................
229
11.2 Log
..................................................................................................................................
230
11.2.1 Search
....................................................................................................................
232
11.2.2 Log Records Configuration
.....................................................................................
232
11.2.3 Log Buzzer Priority Configuration
...........................................................................
233
11.2.4 Report Configuration
..............................................................................................
233
11.2.5 Export Log
..............................................................................................................
236
11.3 Configuration
....................................................................................................................
237
11.3.1 Restoring the Configuration File
.............................................................................
238
11.4 SSL
..................................................................................................................................
239
11.5 Firmware Upgrade
...........................................................................................................
241
11.6 Power Management
.........................................................................................................
242
11.6.1 Power Control Schedule
.........................................................................................
244
11.7 Shutdown
.........................................................................................................................
245
Part III: Troubleshooting and Specifications
.....................................
247
Chapter
12
Troubleshooting
...................................................................................................................
249
12.1 Troubleshooting Overview
...............................................................................................
249
12.2 Power, Hardware Connections, and LEDs
......................................................................
249
12.3
NSA Login and Access
...................................................................................................
251
12.4 Users Cannot Access the NSA
........................................................................................
253
12.5 Backups and Snapshots
..................................................................................................
254